PROTEGENT ENTERPRISE SECURITY
FORM

Protegent Enterprise Security

Protegent Enterprise Security features three efficient components to keep you safe from Information Security Breach. It includes Activity Reporter for comprehensive reporting with alerts regarding activities of employees in enterprise through a single management console, Data Leakage Prevention to avoid data leakgae possibilities and Asset Tracking to tag and track all the software and hardware assets.

Benefits

Components

Protegent Enterprise security has been designed to provide security solution to Enterprise Networks. It is a Multi Tier Security suite that includes Data Lakage Prevention, Activity Reporter ans Asset Tracking

Systems with Common Administrative user name and password can be saved as“everyone”.

Using export option administrator can save the credential list.

Import option to restore previously saved credential list.

Deployment on multiple clients can be done simultaneously.

Administrator can give Full privilegesto power user.

Exclusive feature of giving warning to the administrator about the status of client machine in following ways:

If communication is broken between the client and server.

Ifdeployed product is not workingatclient.

Settings-based centralized management.

If client isinactive with server for a configured days.

Customization of reports according to administrator requirement.

Defining different policies for different users.

Backup and Restore option for policies (settings).

After installation, auto-start-up of themodules makes the software user friendly.

Easy installation with option of customizes installation.

Option for the Backup of settings, reporting, network structure and license for later use.

Restore option for the restoration of the earlier saved or backed-up data.

Backup option at the Console and at the time of un-installation .

Protection from unauthorized un-installation by asking for authorized password at time of un-installation.

Detailed reports of each client.

Option of IP range Deployment in the network.

Sets restrictions against all communication ports by blocking and unblocking them.

Prevent data theft as well as unauthorized access of critical data.

The modules included in Protegent Enterprise Security are:

Data Leakage Prevention

Activity Reporter

Asset Tagging & Tracking

System Requirements

Hardware & Software Required at Server

For Windows 2000

1.66 MHz or higher processor

512 MB of RAM Memory(1 GB recommended)

900 MB available hard disk space (1 GB recommended)

Win 2000 (SP 4)

Internet Explorer 6.0 (or higher)

Microsoft Data Access Components 2.8 (MDAC)

For Windows XP/Vista/Windows 7/ Win Server 2008/2003

1.66 MHz or higher processor

512 MB of RAM Memory(1 GB recommended)

900 MB available harddisk space (1 GB recommended)

Hardware & Software Required at Client

Provides proactive protection against data theft by blocking USB, IEEE 1394, Network Adaptors, CD/DVD ROM, Printers, Infrared and Bluetooth with the flexibility to block single or multiple ports either permanently, on schedule or when idle. The USB device can also be white-listed for selected users.

Unique feature of USB Read Only enables the admin/user to make any USB mass storage device read only. File transfer log feature generates the complete log of data transferred to and from mass USB storage devices. E-mail filtering option filters and block the Emails according to attachments, size of attachments, keywords in the body of the Email & Body size which are send from MS Outlook.

This module helps you prevent unauthorized access to critical data. It also provides comprehensive reports as well as instant email alerts of port usage and if a user attempts to use a blocked port.

Proactive protection against data theft.

Sets restrictions against all communication ports by blocking and unblocking them.

Prevent data theft as well as unauthorized access of critical data

Unique feature of White listing the authorized USB by using unique hardware ID of the device.

Feature of USB Read Only makes any USB mass storage device read only.

File Transfer Log will show the reports of files transferred to and from a USB mass storage device.

File Transfer Log shows the detail reports of files added, removed and renamed to and from USB mass storage device.

Options to open single or multiple ports with authorized password when it is permanently locked.

Infrared Locking

Flash Drive (i.e. USB, External HDD etc.) Locking

Block ports when PC is idle.

Gives you information of usage of resources on the network by logging system usage time, idle time, keystrokes, websites viewed, chat interactions, file transfer logging, cut/copy clipboard information, application usage monitoring. It also captures screenshots of full as-well-as working screens and alerts on usage of Blacklisted Applications. This module helps analyze exact system usage and hence optimize utilization of resources. It also helps access employee productivity, user surveillance, forensics, and can also help you optimize IT purchases.

Captures
Application activity.

With
the help of application monitor
time log can be maintained for
specific applications.

Unique
feature of Blacklist and white
list

Blacklist: applications will get
identified and be visible
in alertsWhite
list: Won’t
record any activity of
the application added
in this list.

Captures
clipboard contents

Captures
Internet activity

Logs
websites visited

Captures
all keystrokes, in case sensitivity.

Option
of showing system/non-printable
keys is also available.

Take
screenshots within the specified
time interval or on every mouse
click.

Option
of different qualities of screenshot.

Option
of capturing the desktop and
capturing the foreground of
the window.

Setting
of report log size (Min 1 MB
to Max 5 MB).

Manage
the logs by setting log days
(Min 1 day to Max 90 days).

Complete
activity report w.r.t. user
login if multiple users are
working on same machine

Provides
the details of the each user
login and log out time

Logging
of working hours and
idle time.

Option
to select the level of tracking.

Send
the reports to the specified
email (in the stealth mode).

Uploads all
logs into the separate folders
by FTP (in the stealth mode).

Sending
of report logs in a specific
time interval.

Password
protected so only authorized
personnel can access the reports.

Loaded
with an intuitive interface
and very easy to use, even for
beginners.